I don't think you're going to be happy when somebody uses you to launch a DDOS:
system("ping -c 2 8.8.8.8");
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_req=1 ttl=55 time=1.98 ms
64 bytes from 8.8.8.8: icmp_req=2 ttl=55 time=1.75 ms